diff options
author | Stefan Metzmacher <metze@samba.org> | 2009-04-21 04:55:42 +0200 |
---|---|---|
committer | Stefan Metzmacher <metze@samba.org> | 2009-05-01 17:42:06 +0200 |
commit | 2ae92c759925023cc6d357c4f4d9cc3b308186aa (patch) | |
tree | 10f63b3e9ef19a38465ffc20ffe555c2849561da /source4/smbd | |
parent | 863c048d268fe75aded636859bd5c0689ac664db (diff) | |
download | samba-2ae92c759925023cc6d357c4f4d9cc3b308186aa.tar.gz samba-2ae92c759925023cc6d357c4f4d9cc3b308186aa.tar.bz2 samba-2ae92c759925023cc6d357c4f4d9cc3b308186aa.zip |
s4:smbd: add support for named_pipe_auth level 2 in service_named_pipe...
metze
Diffstat (limited to 'source4/smbd')
-rw-r--r-- | source4/smbd/service_named_pipe.c | 59 |
1 files changed, 55 insertions, 4 deletions
diff --git a/source4/smbd/service_named_pipe.c b/source4/smbd/service_named_pipe.c index de4726e4d5..f82d91e867 100644 --- a/source4/smbd/service_named_pipe.c +++ b/source4/smbd/service_named_pipe.c @@ -29,6 +29,7 @@ #include "lib/stream/packet.h" #include "librpc/gen_ndr/ndr_named_pipe_auth.h" #include "system/passwd.h" +#include "libcli/raw/smb.h" struct named_pipe_socket { const char *pipe_name; @@ -107,7 +108,7 @@ static NTSTATUS named_pipe_recv_auth_request(void *private_data, DEBUG(10,("named_pipe_auth: req_blob.length[%u]\n", (unsigned int)req_blob.length)); - dump_data(10, req_blob.data, req_blob.length); + dump_data(11, req_blob.data, req_blob.length); /* parse the passed credentials */ ndr_err = ndr_pull_struct_blob_all( @@ -123,6 +124,10 @@ static NTSTATUS named_pipe_recv_auth_request(void *private_data, goto reply; } + if (DEBUGLVL(10)) { + NDR_PRINT_DEBUG(named_pipe_auth_req, &req); + } + if (strcmp(NAMED_PIPE_AUTH_MAGIC, req.magic) != 0) { DEBUG(2, ("named_pipe_auth_req: invalid magic '%s' != %s\n", req.magic, NAMED_PIPE_AUTH_MAGIC)); @@ -166,6 +171,49 @@ static NTSTATUS named_pipe_recv_auth_request(void *private_data, } break; + case 2: + rep.level = 2; + rep.info.info2.file_type = FILE_TYPE_MESSAGE_MODE_PIPE; + rep.info.info2.device_state = 0xff | 0x0400 | 0x0100; + rep.info.info2.allocation_size = 4096; + + if (!req.info.info2.sam_info3) { + /* + * anon connection, we don't create a session info + * and leave it NULL + */ + rep.status = NT_STATUS_OK; + break; + } + + val.sam3 = req.info.info2.sam_info3; + + rep.status = make_server_info_netlogon_validation(pipe_conn, + val.sam3->base.account_name.string, + 3, &val, &server_info); + if (!NT_STATUS_IS_OK(rep.status)) { + DEBUG(2, ("make_server_info_netlogon_validation returned " + "%s\n", nt_errstr(rep.status))); + goto reply; + } + + /* setup the session_info on the connection */ + rep.status = auth_generate_session_info(conn, + conn->event.ctx, + conn->lp_ctx, + server_info, + &conn->session_info); + if (!NT_STATUS_IS_OK(rep.status)) { + DEBUG(2, ("auth_generate_session_info failed: %s\n", + nt_errstr(rep.status))); + goto reply; + } + + conn->session_info->session_key = data_blob_const(req.info.info2.session_key, + req.info.info2.session_key_length); + talloc_steal(conn->session_info, req.info.info2.session_key); + + break; default: DEBUG(2, ("named_pipe_auth_req: unknown level %u\n", req.level)); @@ -187,10 +235,13 @@ reply: return status; } - pipe_conn->status = rep.status; - DEBUG(10,("named_pipe_auth reply[%u]\n", rep_blob.length)); - dump_data(10, rep_blob.data, rep_blob.length); + dump_data(11, rep_blob.data, rep_blob.length); + if (DEBUGLVL(10)) { + NDR_PRINT_DEBUG(named_pipe_auth_rep, &rep); + } + + pipe_conn->status = rep.status; status = packet_send_callback(pipe_conn->packet, rep_blob, named_pipe_handover_connection, pipe_conn); |